Novel order preserving encryption scheme for wireless sensor networks
暂无分享,去创建一个
[1] Sehun Kim,et al. Chaotic Order Preserving Encryption for Efficient and Secure Queries on Databases , 2009, IEICE Trans. Inf. Syst..
[2] Cong Wang,et al. Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data , 2012, IEEE Transactions on Parallel and Distributed Systems.
[3] Nathan Chenette,et al. Order-Preserving Symmetric Encryption , 2009, IACR Cryptol. ePrint Arch..
[4] Nickolai Zeldovich,et al. An Ideal-Security Protocol for Order-Preserving Encoding , 2013, 2013 IEEE Symposium on Security and Privacy.
[5] Nathan Chenette,et al. Order-Preserving Encryption Revisited: Improved Security Analysis and Alternative Solutions , 2011, CRYPTO.
[6] Martin E. Dyer,et al. Order-Preserving Encryption Using Approximate Integer Common Divisors , 2017, DPM/CBT@ESORICS.
[7] Dongxi Liu,et al. Programmable Order-Preserving Secure Index for Encrypted Database Query , 2012, 2012 IEEE Fifth International Conference on Cloud Computing.
[8] Ramakrishnan Srikant,et al. Order preserving encryption for numeric data , 2004, SIGMOD '04.
[9] Divyakant Agrawal,et al. Database Management as a Service: Challenges and Opportunities , 2009, 2009 IEEE 25th International Conference on Data Engineering.
[10] Hiroyuki Kitagawa,et al. A Secure and Efficient Order Preserving Encryption Scheme for Relational Databases , 2010, KMIS.
[11] Dongxi Liu,et al. Nonlinear order preserving index for encrypted database query in service cloud environments , 2013, Concurr. Comput. Pract. Exp..
[12] Jyoteesh Malhotra,et al. Review on Security Issues and Attacks in Wireless Sensor Networks , 2015 .
[13] Ilsun You,et al. New order preserving encryption model for outsourced databases in cloud environments , 2016, J. Netw. Comput. Appl..
[14] YangJun,et al. New order preserving encryption model for outsourced databases in cloud environments , 2016 .
[15] Jianfeng Ma,et al. hOPE: improved order preserving encryption with the power to homomorphic operations of ciphertexts , 2017, Science China Information Sciences.
[16] Christophe Guyeux,et al. Efficient and accurate monitoring of the depth information in a Wireless Multimedia Sensor Network based surveillance , 2017, 2017 Sensors Networks Smart and Emerging Technologies (SENSET).
[17] Sung Je Hong,et al. Order-Preserving Encryption for Non-uniformly Distributed Plaintexts , 2011, WISA.
[18] Jacques M. Bahi,et al. Two security layers for hierarchical data aggregation in sensor networks , 2014, Int. J. Auton. Adapt. Commun. Syst..
[19] Hiroyuki Kitagawa,et al. MV-OPES: Multivalued-Order Preserving Encryption Scheme: A Novel Scheme for Encrypting Integer Value to Many Different Values , 2010, IEICE Trans. Inf. Syst..
[20] Vladimir Kolesnikov,et al. On the limits of privacy provided by order-preserving encryption , 2012, Bell Labs Technical Journal.
[21] Weiming Zhang,et al. Security Analysis on One-to-Many Order Preserving Encryption-Based Cloud Data Search , 2015, IEEE Transactions on Information Forensics and Security.
[22] Jacques M. Bahi,et al. A Complete Security Framework for Wireless Sensor Networks: Theory and Practice , 2015, Int. J. Inf. Technol. Web Eng..
[23] Minkyu Kim,et al. Comment on the Security of an Order-Preserving Encryption Scheme Using Pseudo-Random Function , 2016, IEICE Trans. Commun..